|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 223] New: "xm destroy" causing x86_64 Xen to crash
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=223
Summary: "xm destroy" causing x86_64 Xen to crash
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: aravindh.puthiyaparambil@xxxxxxxxxx
I find that when I force a DomU to crash (for example by specifying an incorrect
root= option) and then do an "xm destroy" on the DomU, Xen crashes.
This is with x86_64 Xen on a Dell PowerEdge 470 (4x with HT) and 2GB RAM running
SLES9 SP2
This is on changeset 6714.
Isn't smp_send_stop() happening on all VCPUS????
DomU Crash
----------
Please append a correct "root=" boot option
Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
Xen Crash
---------
(XEN) BUG at domain.c:1058
(XEN) CPU: 0
(XEN) RIP: e010:[<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000 rbx: 0000000000000000 rcx: 0000000000003c51
(XEN) rdx: 0000000000003c51 rsi: 0000000000000001 rdi: 000000000000001a
(XEN) rbp: ffff830000fce080 rsp: ffff830000105a78 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000003c3c r11: ffff830000184c7f
(XEN) r12: 0000000000000000 r13: ffff830000fce080 r14: ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN) ffff830000fce080 0000000000000000 ffff830000fce080 0000000000000000
(XEN) ffff830000fea080 ffff830000109a89 0000000000073247 ffff830000fce080
(XEN) 00000000409fc1f0 ffff8300001089d1 03fffffc20000000 00000000000001fc
(XEN) 00000000000001fc ffff830076b31000 0001ffff00000000 00007fffc0000000
(XEN) 0000000000076b31 ffff8300001253e1 00000000f0000000 0000000000000001
(XEN) 0000000000000000 ffff830000105f28 ffff830000ff1080 00000000f0000000
(XEN) 0001ffff40000001 ffff82840128bfa8 00000000f0000000 ffff830000105f28
(XEN) 0001ffff40000000 ffff830000125d14 000000ff00000000 ffff8300098ba000
(XEN) 0000000000000000 0000000080000003 0000000000ff1080 0000000080000002
(XEN) ffff82840128bfa8 ffff830000ff1080 0000000000076b31 ffff830000127225
(XEN) 0000000000ff1080 ffff830000000000 0001ffff40000000 00000000000001ff
(XEN) 00000000000001ff ffff830008939000 000000ff00000000 00007f8000000000
(XEN) 0000000000008939 0000000000000002 ffff8284011ff210 ffff830000ff1080
(XEN) 0000000000ff1080 ffff830000000000 0000000080000000 ffff830000123468
(XEN) ffff830073248000 0000000000000000 ffff830000ff1080 ffff8300001238df
(XEN) 0000000080000002 0000000020000000 ffff8284011fdb18 0000000020000001
(XEN) 0fffffff00000000 00000000e0000000 0000000080000000 ffff830000123b93
(XEN) ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0 ffff830000105f28
(XEN) ffff830000ff1080 000ffffffffff000 ffff830000196600 00000000f0000000
(XEN) 0000005560000001 ffff828401240b20 00000000f0000000 ffff830000105f28
(XEN) Xen call trace:
(XEN) [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN) [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN) [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN) [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN) [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN) [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN) [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN) BUG at domain.c:1058
(XEN) CPU: 0
(XEN) RIP: e010:[<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) RFLAGS: 0000000000010292
(XEN) rax: 0000000000000000 rbx: 0000000000000000 rcx: 0000000000003c51
(XEN) rdx: 0000000000003c51 rsi: 0000000000000001 rdi: 000000000000001a
(XEN) rbp: ffff830000fce080 rsp: ffff830000105a78 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000003c3c r11: ffff830000184c7f
(XEN) r12: 0000000000000000 r13: ffff830000fce080 r14: ffff830000105f28
(XEN) r15: ffffffffffffffea
(XEN) Xen stack trace from rsp=ffff830000105a78:
(XEN) ffff830000fce080 0000000000000000 ffff830000fce080 0000000000000000
(XEN) ffff830000fea080 ffff830000109a89 0000000000073247 ffff830000fce080
(XEN) 00000000409fc1f0 ffff8300001089d1 03fffffc20000000 00000000000001fc
(XEN) 00000000000001fc ffff830076b31000 0001ffff00000000 00007fffc0000000
(XEN) 0000000000076b31 ffff8300001253e1 00000000f0000000 0000000000000001
(XEN) 0000000000000000 ffff830000105f28 ffff830000ff1080 00000000f0000000
(XEN) 0001ffff40000001 ffff82840128bfa8 00000000f0000000 ffff830000105f28
(XEN) 0001ffff40000000 ffff830000125d14 000000ff00000000 ffff8300098ba000
(XEN) 0000000000000000 0000000080000003 0000000000ff1080 0000000080000002
(XEN) ffff82840128bfa8 ffff830000ff1080 0000000000076b31 ffff830000127225
(XEN) 0000000000ff1080 ffff830000000000 0001ffff40000000 00000000000001ff
(XEN) 00000000000001ff ffff830008939000 000000ff00000000 00007f8000000000
(XEN) 0000000000008939 0000000000000002 ffff8284011ff210 ffff830000ff1080
(XEN) 0000000000ff1080 ffff830000000000 0000000080000000 ffff830000123468
(XEN) ffff830073248000 0000000000000000 ffff830000ff1080 ffff8300001238df
(XEN) 0000000080000002 0000000020000000 ffff8284011fdb18 0000000020000001
(XEN) 0fffffff00000000 00000000e0000000 0000000080000000 ffff830000123b93
(XEN) ffff8284013b28f0 ffff8284011fdb18 ffff830076b31fe0 ffff830000105f28
(XEN) ffff830000ff1080 000ffffffffff000 ffff830000196600 00000000f0000000
(XEN) 0000005560000001 ffff828401240b20 00000000f0000000 ffff830000105f28
(XEN) Xen call trace:
(XEN) [<ffff83000011ba9e>] domain_relinquish_resources+0x13e/0x360
(XEN) [<ffff830000109a89>] domain_kill+0x49/0x110
(XEN) [<ffff8300001089d1>] do_dom0_op+0x411/0x940
(XEN) [<ffff8300001253e1>] alloc_page_type+0x2b1/0x890
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000125d14>] get_page_type+0x354/0x450
(XEN) [<ffff830000127225>] get_page_and_type_from_pagenr+0xe5/0x250
(XEN) [<ffff830000123468>] put_page_from_l1e+0x158/0x1c0
(XEN) [<ffff8300001238df>] free_page_type+0x26f/0x430
(XEN) [<ffff830000123b93>] put_page_type+0xf3/0x130
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff830000105f28>] cpu0_stack+0x1f28/0x2000
(XEN) [<ffff83000013b6dc>] syscall_enter+0x5c/0x61
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) CPU0 FATAL TRAP: vector = 6 (invalid operand)
(XEN) [error_code=0000]
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 223] New: "xm destroy" causing x86_64 Xen to crash,
bugzilla-daemon <=
|
|
|
|
|